logo

Analysis of IS Security and Risk Management in Telstra

   

Added on  2023-03-20

15 Pages3667 Words42 Views
 | 
 | 
 | 
Running Head: ANALYSIS OF IS SECURITY AND RISK MANAGEMENT IN TELSTRA
ANALYSIS OF IS SECURITY AND RISK MANAGEMENT IN TELSTRA
Name of the Student
Name of the University
Author Note
Analysis of IS Security and Risk Management in Telstra_1

1
CASE STUDY OF INFORMATION SYSTEM STRATEGY IN TELSTRA
Table of Contents
Introduction................................................................................................................................2
Discussion..................................................................................................................................2
Company and product selection.............................................................................................2
Evolution of IS/IT strategy.....................................................................................................4
Major challenges facing business...........................................................................................5
Recent scenario of IS/IT for organization..............................................................................6
Role of IS/IT in contemporary environment..........................................................................6
Management IS for managing and controlling organization system.....................................7
Execution of IS/IT strategy should be presented...................................................................9
Conclusion................................................................................................................................10
References................................................................................................................................11
Analysis of IS Security and Risk Management in Telstra_2

2
CASE STUDY OF INFORMATION SYSTEM STRATEGY IN TELSTRA
Introduction
The information system services that are provided by an organization help it to increase the
business and also facilitate the business processes within the organization. Telstra is an
organization that is the one of the leading carrier of the telecommunication service provider.
The organization allow wide range of facilities to the customers an d the staffs that are related
to the information security. There is a huge range of the use of the network devices within the
organization which includes routers and the switches which increases the threat of the cyber
attack within the organization. The installation of the security devices can minimize threat of
the cyber-attacks within the organization. Most of the cyber attacks are done using the
malicious contents spreading with the websites and the email chains which can affect the data
of the organization. The organization can use the Windows 2016 severs for hosting its
website that is a secure way. There can be several impacts of the employees on the
information security of the selected organization and the risk can be reduced with the use of
proper risk management strategies. Windows server 2016 have different tools for the purpose
of auditing that will be used for monitoring the web servers and the mail servers within the
organization. The organization Telstra deals with many servers to continue with its activities
and thus face several threat from the cyber-attacks. Thus it can implement the Windows
server 2016 and proper employee training to minimize such risk and vulnerabilities (Ishikawa
and Sakurai 2017).
Discussion
Threat and vulnerabilities of the network devices
There are several risk that comes with the network device like routers and switch.
The routers and the switches are used in large scale within the organization. They are the
most important network devices within the organization. The threat that are associated with
Analysis of IS Security and Risk Management in Telstra_3

3
CASE STUDY OF INFORMATION SYSTEM STRATEGY IN TELSTRA
router and the switch is the wrong configuration of the these devices (Huq 2016). The
placement of these devices in the proper network topology is important to ensure the security
that is meant to be there. The wrong placement allows the attackers to get an attacking
surface. If the router is explosive to the interface of the internet or any illicit network this
increases the vulnerability If the attacker get the access of the routing or the switch devices
that can enables the denial of services within the systems of the organization (Engqvist and
Mori Soto 2017). If the servers of the organization are accessible then the network devices
cannot be compromised. The authentication step that need to be performed with these
network devices also increases the threats. If a local account is used by the router and the
switches the threat increases as the local account cannot be locked and the same account can
be used by a variety of peoples. If the attackers get the access to these devices these will
increase the vulnerabilities to the cyber attacks (Szewczyk and Macdonald 2017). The data of
the organization can be hacked that can be huge loss to the organization. The attackers can
keep the electronics data of the organization as hostage and can demand money for giving
back the data access. The organization can suffer huge loss due to these threats and
vulnerabilities.
Devices that will ensure mitigation of these Threats
The network security devices increases the security of using these network devices thus
minimizing the threats and vulnerabilities that are associated with it. The use of proper
network security device can help in diminishing the risk. The two network security devices
are as follows:-
1. Firewall:- These network security device help in isolating one network device from
the other. The firewalls can be installed in the router or the switches to reduce the risk.
There is an availability of the software and the hardware appliances can be used to
separate the different types of networks within the organization (Pathan 2016). These
Analysis of IS Security and Risk Management in Telstra_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents